SlideShare a Scribd company logo
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 14
Novel Methods of Generating Self-Invertible Matrix for Hill
Cipher Algorithm
Bibhudendra Acharya bibhudendra@gmail.com
Department of Electronics & Communication Engineering
National Institute of Technology Rourkela
Rourkela, 769 008, India
Girija Sankar Rath gsrath@nitrkl.ac.in
Professor, Department of Electronics & Communication Engineering
National Institute of Technology Rourkela
Rourkela, 769 008, India
Sarat Kumar Patra skpatra@nitrkl.ac.in
Professor, Department of Electronics & Communication Engineering
National Institute of Technology Rourkela
Rourkela, 769 008, India
Saroj Kumar Panigrahy skp.nitrkl@gmail.com
Department of Computer Science & Engineering
National Institute of Technology Rourkela
Rourkela, 769 008, India
Abstract
In this paper, methods of generating self-invertible matrix for Hill Cipher algorithm
have been proposed. The inverse of the matrix used for encrypting the plaintext
does not always exist. So, if the matrix is not invertible, the encrypted text cannot
be decrypted. In the self-invertible matrix generation method, the matrix used for
the encryption is itself self-invertible. So, at the time of decryption, we need not to
find inverse of the matrix. Moreover, this method eliminates the computational
complexity involved in finding inverse of the matrix while decryption.
Keywords: Hill Cipher, Encryption, Decryption, Self-invertible matrix.
1. INTRODUCTION
Today, in the information age, the need to protect communications from prying eyes is greater
than ever before. Cryptography, the science of encryption, plays a central role in mobile phone
communications, pay-TV, e-commerce, sending private emails, transmitting financial information,
security of ATM cards, computer passwords, electronic commerce and touches on many aspects
of our daily lives [1]. Cryptography is the art or science encompassing the principles and methods
of transforming an intelligible message (plaintext) into one that is unintelligible (ciphertext) and
then retransforming that message back to its original form. In modern times, cryptography is
considered to be a branch of both mathematics and computer science, and is affiliated closely
with information theory, computer security, and engineering [2].
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 15
Conventional Encryption is referred to as symmetric encryption or single key encryption. It can be
further divided into categories of classical techniques and modern techniques. The hallmark of
conventional encryption is that the cipher or key to the algorithm is shared, i.e., known by the
parties involved in the secured communication. Substitution cipher is one of the basic
components of classical ciphers. A substitution cipher is a method of encryption by which units of
plaintext are substituted with ciphertext according to a regular system; the units may be single
letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.
The receiver deciphers the text by performing an inverse substitution [3]. The units of the plaintext
are retained in the same sequence as in the ciphertext, but the units themselves are altered.
There are a number of different types of substitution cipher. If the cipher operates on single
letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters
is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message,
whereas a polyalphabetic cipher uses a number of substitutions at different times in the
message— such as with homophones, where a unit from the plaintext is mapped to one of
several possibilities in the ciphertext. Hill cipher is a type of monoalphabetic polygraphic
substitution cipher.
In this paper, we proposed novel methods of generating self-invertible matrix which can be used
in Hill cipher algorithm. The objective of this paper is to overcome the drawback of using a
random key matrix in Hill cipher algorithm for encryption, where we may not be able to decrypt
the encrypted message, if the matrix is not invertible. Also the computational complexity can be
reduced by avoiding the process of finding inverse of the matrix at the time of decryption, as we
use self-invertible key matrix for encryption.
The organization of the paper is as follows. Following the introduction, the basic concept of Hill
Cipher is outlined in section 2. Section 3 discusses about the modular arithmetic. In section 4,
proposed methods for generating self-invertible matrices are presented. Finally, section 5
describes the concluding remarks.
2. HILL CIPHER
It is developed by the mathematician Lester Hill in 1929. The core of Hill cipher is matrix
manipulations. For encryption, algorithm takes m successive plaintext letters and instead of that
substitutes m cipher letters. In Hill cipher, each character is assigned a numerical value like
25,...,1,0 === zba [4]. The substitution of ciphertext letters in the place of plaintext letters leads
to m linear equation. For 3=m , the system can be described as follows:
26mod)(
26mod)(
26mod)(
3332321311
3232221212
3132121111
PKPKPKC
PKPKPKC
PKPKPKC
++=
++=
++=
… (1)
This case can be expressed in terms of column vectors and matrices:




















=










3
2
1
333231
232221
131211
3
2
1
P
P
P
KKK
KKK
KKK
C
C
C
… (2)
or simply we can write as KPC = , where C and P are column vectors of length 3, representing
the plaintext and ciphertext respectively, and K is a 33× matrix, which is the encryption key. All
operations are performed 26mod here. Decryption requires using the inverse of the matrix K .
The inverse matrix 1−
K of a matrix K is defined by the equation IKKKK --
== 11
, where I is
the Identity matrix. But the inverse of the matrix does not always exist, and when it does, it
satisfies the preceding equation. 1−
K is applied to the ciphertext, and then the plaintext is
recovered. In general term we can write as follows:
For encryption: pk KPEC == )( … (3)
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 16
For decryption: PKKCKCDP p
--
k ==== 11
)( … (4)
3. MODULAR ARITHMETIC
The arithmetic operation presented here are addition, subtraction, unary operation, multiplication
and division [5]. Based on this, the self-invertible matrix for Hill cipher algorithm is generated. The
congruence modulo operator has the following properties:
1. ( )banpba −≡ ifmod
2. ( ) ( ) pbapbpa modmodmod ≡⇒=
3. pabpba modmod ≡⇒≡
4. pcapabpba modmodandmod ≡⇒≡≡
Let [ ]app −= ,...,1,0Z the set of residues modulo p . If modular arithmetic is performed within this
set pZ , the following equations present the arithmetic operations:
1. Addition : ( ) ( ) ( )[ ] ppbpapba modmodmodmod +=+
2. Negation : )mod(mod pappa −=−
3. Subtraction : ( ) ( ) ( )[ ] ppbpapba modmodmodmod −=−
4. Multiplication : ( ) ( ) ( )[ ] ppbpapba modmodmodmod ∗=∗
5. Division : ( ) cpba =mod/ when ( ) pcba mod∗=
The following Table exhibits the properties of modular arithmetic.
Property Expression
Commutative Law
( ) ( )
( ) ( ) pxpx
pxpx
modmod
modmod
ωω
ωω
∗=∗
+=+
Associative law ( )[ ] ( )[ ] pyxpyx modmod ++=++ ωω
Distribution Law ( )[ ] ( ){ } ( ){ }[ ] ppypxpyx modmodmodmod ∗∗∗=+∗ ωωω
Identities
( )
( ) papaand
papa
modmod1
modmod0
=∗
=+
Inverses
For each ,pZx ∈ ∃ y such that ( ) xypyx −==+ then0mod
For each pZx ∈ ∃ y such that ( ) 1mod =∗ pyx
Table 1: Properties of Modular Arithmetic
4. PROPOSED METHODS FOR GENERATING SELF-INVERTIBLE MATRIX
As Hill cipher decryption requires inverse of the matrix, so while decryption one problem arises
that is, inverse of the matrix does not always exist [5]. If the matrix is not invertible, then
encrypted text cannot be decrypted. In order to overcome this problem, we suggest the use of
self-invertible matrix generation method while encryption in the Hill Cipher. In the self-invertible
matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the
time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the
computational complexity involved in finding inverse of the matrix while decryption.
A is called self-invertible matrix if 1−
= AA . The analyses presented here for generation of self-
invertible matrix are valid for matrix of +ve integers, that are the residues of modulo arithmetic on
a prime number.
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 17
4.1 Generation of self-invertible 22× matrix
Let 





=
2221
1211
aa
aa
A , then,
)(tdeterminan
))((cofactor
)(tdeterminan
)(adjoint1
A
A
A
A
A
T
==−






−
−
∆
=∴ −
1121
12221 1
aa
aa
a
A , where, a∆ is the )(tdeterminan A
A is said to be self-invertible if 1−
= AA
So, aaa ∆−= /1212 & aaa ∆−= /2121
0and1 22112211 =+⇒−=−=∆∴ aaaaa … (5)
Example: (For modulo 13)






=
1112
32
A
4.2 Generation of self-invertible 33× matrix
Let 





=










=
2221
1211
333231
232221
131211
AA
AA
aaa
aaa
aaa
A
where 11A is a 11× matrix = [ ]11a , 12A is a 21× matrix = [ ]1312 aa ,
21A is a 12× matrix = 





31
21
a
a
and 22A is 22× matrix = 





3332
2322
aa
aa
If A is self-invertible then,
IAAAAAAA
AAAAIAAA
=+=+
=+=+
2
22122121221121
221212112112
2
11
and,0
,0,
… (6)
Since 11A is 11× matrix = [ ]11a and ( ) 0221121 =+ AIaA
For non- trivial solution, it is necessary that 02211 =+ AIa
That is −=11a (one of the Eigen values of 22A )
1221AA can also be written as






=











=
13311231
132112211312
31
21
1221
000
0
aaaa
aaaaaa
a
a
AA
So 1221 AA is singular and
2
221221 AIAA −= … (7)
Hence 22A must have an Eigen value 1± . It can be shown that [ ] 21121221 AAAATrace = .
Since it can be proved that if −== 1111 aA (one of the Eigen values of 22A ),
then, any non-trivial solution of the equation (7) will also satisfy
2
112112 1 aAA −= … (8)
Example: (For modulo 13)
Take 





=
61
52
22A which has Eigen value =λ 1 and 7
−=11a 7 = 6 or −1 = 12
If 611 =a ,
then, 





=





−=











−=−=
125
125
28
19
61
52
61
522
221221 IIAIAA
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 18
51221 =aa . So, 521 =a and 112 =a
121321 =aa . So, 5
5
12
13 ==a and 5
1
5
31 ==a
So the matrix will be










=
615
525
516
A . Other matrix can also be obtained if we take 1211 =a .
4.3 Generation of self-invertible 44× matrix
Let












=
44434241
34333231
24232221
14131211
aaaa
aaaa
aaaa
aaaa
A be self-invertible matrix partitioned as 





=
2221
1211
AA
AA
A ,
where 





=
2221
1211
11
aa
aa
A , 





=
2423
1413
12
aa
aa
A , 





=
4241
3231
21
aa
aa
A , 





=
4243
3433
22
aa
aa
A
Then, 2
112112 AIAA −= , 022121211 =+ AAAA ,
021221121 =+ AAAA , and 2
221221 AIAA −=
In order to obtain solution for all the four matrix equations, 2112 AA can be factorized as
( )( )11112112 AIAIAA +−= … (9)
So, if ( )kAIA 1112 −= or ( )kAI 11+
( )
k
AIA
1
1121 += or ( )
k
AI
1
11− , where k is a scalar constant.
Then, ( ) ( ) 2211111122121211 AkAIkAIAAAAA −+−=+ or ( ) ( )112211 AIAAk −+
So, IAorAA ==+ 112211 0 … (10)
Since IA =11 is a trivial solution, then, 02211 =+ AA is taken.
When we solve the 3
rd
and 4
th
matrix equations, same solution is obtained.
Example: (For Modulo 13)
Take 





=
48
31
22A then, 





=
95
1012
11A
Take 1112 AIA −= with 1=k . Then, 





=
58
32
12A and 





=
105
100
21A
So












=
48105
31100
5895
321012
A
4.4 A general method of generating an even self-invertible matrix
Let A=
















nnnn
n
n
aaa
aaa
aaa
......
...............
...............
......
......
21
22221
11211
be an nn × self-invertible matrix partitioned to 





=
2221
1211
AA
AA
A ,
where n is even and 2221,1211 &, AAAA are matrices of order
22
nn
× each.
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 19
So, ( )( )1111
2
112112 AIAIAIAA +−=−= … (11)
If 12A is one of the factors of 2
11AI − then 21A is the other.
Solving the 2
nd
matrix equation results 02211 =+ AA .
Then form the matrix.
Algorithm:
1. Select any arbitrary
22
nn
× matrix 22A .
2. Obtain 2211 AA −=
3. Take ( ) ( )111112 or AIkAIkA +−= for k a scalar constant.
4. Then ( ) ( )111121
1
or
1
AI
k
AI
k
A −+=
5. Form the matrix completely.
Example: (For modulo 13)
Let 





=
43
210
22A , then, 





=
910
113
11A
If k is selected as 2, 





=−=
106
49
)( 1112 AIkA and 





=
55
122
21A
So,












=
4355
210122
106910
49113
A
4.5 A general method of generating self-invertible matrix
Let A=












nnnn
n
n
aaa
aaa
aaa
...
............
...
...
21
22221
11211
be an nn × self-invertible matrix partitioned to 





=
2221
1211
AA
AA
A
11A is a 11× matrix = [ ]11a , 12A is a )1(1 −× n matrix = [ ]naaa 11312 ...
21A is a 1)1( ×−n matrix =












1
31
21
...
na
a
a
, 22A is a )1()1( −×− nn matrix =












nnnn
n
n
aaa
aaa
aaa
...
............
...
...
32
33332
22322
So, 2
11
2
112112 1 aAIAA −=−= … (12)
and ( ) 0221112 =+ AIaA … (13)
Also, −=11a (one of the Eigen values of 22A other than 1)
Since 1221AA is a singular matrix having the rank 1
and 2
221221 AIAA −= … (14)
So, 2
22A must have rank of )2( −n with Eigen values +1 of )2( −n multiplicity.
Therefore, 22A must have Eigen values 1± .
It can also be proved that the consistent solution obtained for elements 21A & 12A by solving the
equation (14) term by term will also satisfy the equation (12).
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 20
Algorithm:
1. Select 22A , a non-singular )1()1( −×− nn matrix which has )2( −n number of Eigen values
of either +1 or −1 or both.
2. Determine the other Eigen value λ of 22A .
3. Set λ−=11a .
4. Obtain the consistent solution of all elements of 21A & 12A by using the equation (14).
5. Formulate the matrix.
Example: (For modulo 13)
Let










=
435
21012
1069
22A which has Eigen values 10,1±=λ
So, [ ]311 =A , and one of the consistent solutions of [ ]491112 =A and










=
5
2
10
21A
So,












=
4355
210122
106910
49113
A
Another consistent solution of [ ]112112 =A and










=
3
9
6
21A
So,












=
4353
210129
10696
11213
A
4.6 Another method to generate self-invertible matrix
Let A be any non-singular matrix and E be its Eigen matrix. Then we know that λEAE = ,
where λ is diagonal matrix with the Eigen values as diagonal elements. E the Eigen matrix is
non-singular.
Then, 1−
= EEA λ … (15)
and ( ) 1111111 −−−−−−−
=== EEEEEEA λλλ … (16)
So, 1−
= AA only when 1−
= λλ
If
















=
nλ
λ
λ
λ
..0000
.......
.......
0..000
0..000
2
1
then,






















=−
nλ
λ
λ
λ
1
000000
.......
.......
0..00
1
0
0...00
1
2
1
1
Thus 1−
= λλ when 1or
1
±== i
i
i λ
λ
λ
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy
International Journal of Security, Volume 1 : Issue (1) 21
Algorithm:
1. Select any nonsingular matrix E .
2. Form a diagonal matrix λ with 1±=λ but all value of λ must not be equal.
3. Then compute AEE =−1
λ .
Example: (For modulo 13)










=
















−−
−−
=










= −
12212
2012
1276
121
2
3
13
3
10
1
3
8
3
8
,
887
654
321
1
EE
Take










=
100
0120
001
λ










=






























== −
803
6110
505
12212
2012
1276
100
0120
001
857
684
3111
1
EEA λ
5. CONCLUSION
This paper suggests efficient methods for generating self-invertible matrix for Hill Cipher
algorithm. These methods encompass less computational complexity as inverse of the matrix is
not required while decrypting in Hill Cipher. These proposed methods for generating self-
invertible matrix can also be used in other algorithms where matrix inversion is required.
6. REFERENCES
1. Blakley G.R., “Twenty years of cryptography in the open literature”, Security and Privacy
1999, Proceedings of the IEEE Symposium, 9-12 May 1999
2. Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C., “Cyptography with Information
Theoretic Security”, Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct
2002
3. A. J. Menezes, P.C. Van Oorschot, S.A. Van Stone, “Handbook of Applied Cryptography”,
CRC press, 1996
4. W. Stallings, “Cryptography and Network Security”, 4
th
edition, Prentice Hall, 2005
5. Bruce Schneir, “Applied Cryptography”, 2
nd
edition, John Wiley & Sons, 1996

More Related Content

What's hot

LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
IJNSA Journal
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
IJECEIAES
 
K010218188
K010218188K010218188
K010218188
IOSR Journals
 
Fuzzy logic member functions
Fuzzy logic member functionsFuzzy logic member functions
Fuzzy logic member functions
Dr. C.V. Suresh Babu
 
A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...
A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...
A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...
Hector Zenil
 
Algorithmic Information Theory and Computational Biology
Algorithmic Information Theory and Computational BiologyAlgorithmic Information Theory and Computational Biology
Algorithmic Information Theory and Computational Biology
Hector Zenil
 
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logicApproximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logicCemal Ardil
 
Design of ternary sequence using msaa
Design of ternary sequence using msaaDesign of ternary sequence using msaa
Design of ternary sequence using msaa
Editor Jacotech
 
Towards a stable definition of Algorithmic Randomness
Towards a stable definition of Algorithmic RandomnessTowards a stable definition of Algorithmic Randomness
Towards a stable definition of Algorithmic Randomness
Hector Zenil
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
cscpconf
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
ijsrd.com
 
Distance Sort
Distance SortDistance Sort
Distance Sort
Waqas Tariq
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)
Alexander Decker
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483IJRAT
 
CPSC 125 Ch 4 Sec 5
CPSC 125 Ch 4 Sec 5CPSC 125 Ch 4 Sec 5
CPSC 125 Ch 4 Sec 5David Wood
 

What's hot (20)

38 116-1-pb
38 116-1-pb38 116-1-pb
38 116-1-pb
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
 
K010218188
K010218188K010218188
K010218188
 
Fuzzy logic member functions
Fuzzy logic member functionsFuzzy logic member functions
Fuzzy logic member functions
 
A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...
A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...
A Numerical Method for the Evaluation of Kolmogorov Complexity, An alternativ...
 
Algorithmic Information Theory and Computational Biology
Algorithmic Information Theory and Computational BiologyAlgorithmic Information Theory and Computational Biology
Algorithmic Information Theory and Computational Biology
 
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logicApproximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
 
Design of ternary sequence using msaa
Design of ternary sequence using msaaDesign of ternary sequence using msaa
Design of ternary sequence using msaa
 
Fk3110791084
Fk3110791084Fk3110791084
Fk3110791084
 
Towards a stable definition of Algorithmic Randomness
Towards a stable definition of Algorithmic RandomnessTowards a stable definition of Algorithmic Randomness
Towards a stable definition of Algorithmic Randomness
 
Bistablecamnets
BistablecamnetsBistablecamnets
Bistablecamnets
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
 
Distance Sort
Distance SortDistance Sort
Distance Sort
 
Lesson 38
Lesson 38Lesson 38
Lesson 38
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)
 
Fn3410321036
Fn3410321036Fn3410321036
Fn3410321036
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483
 
CPSC 125 Ch 4 Sec 5
CPSC 125 Ch 4 Sec 5CPSC 125 Ch 4 Sec 5
CPSC 125 Ch 4 Sec 5
 

Similar to Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.

Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
ijtsrd
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
IJNSA Journal
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
CSCJournals
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
skilljiolms
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
Journal For Research
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
ijccmsjournal
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
ijccmsjournal
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
rahulmonikasharma
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
ijcisjournal
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
ijcisjournal
 
VCE Unit 01 (1).pptx
VCE Unit 01 (1).pptxVCE Unit 01 (1).pptx
VCE Unit 01 (1).pptx
skilljiolms
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
Editor IJCATR
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
F010243136
F010243136F010243136
F010243136
IOSR Journals
 

Similar to Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm. (20)

NCM RB PAPER
NCM RB PAPERNCM RB PAPER
NCM RB PAPER
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
 
VCE Unit 01 (1).pptx
VCE Unit 01 (1).pptxVCE Unit 01 (1).pptx
VCE Unit 01 (1).pptx
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
F010243136
F010243136F010243136
F010243136
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.

  • 1. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 14 Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm Bibhudendra Acharya bibhudendra@gmail.com Department of Electronics & Communication Engineering National Institute of Technology Rourkela Rourkela, 769 008, India Girija Sankar Rath gsrath@nitrkl.ac.in Professor, Department of Electronics & Communication Engineering National Institute of Technology Rourkela Rourkela, 769 008, India Sarat Kumar Patra skpatra@nitrkl.ac.in Professor, Department of Electronics & Communication Engineering National Institute of Technology Rourkela Rourkela, 769 008, India Saroj Kumar Panigrahy skp.nitrkl@gmail.com Department of Computer Science & Engineering National Institute of Technology Rourkela Rourkela, 769 008, India Abstract In this paper, methods of generating self-invertible matrix for Hill Cipher algorithm have been proposed. The inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption. Keywords: Hill Cipher, Encryption, Decryption, Self-invertible matrix. 1. INTRODUCTION Today, in the information age, the need to protect communications from prying eyes is greater than ever before. Cryptography, the science of encryption, plays a central role in mobile phone communications, pay-TV, e-commerce, sending private emails, transmitting financial information, security of ATM cards, computer passwords, electronic commerce and touches on many aspects of our daily lives [1]. Cryptography is the art or science encompassing the principles and methods of transforming an intelligible message (plaintext) into one that is unintelligible (ciphertext) and then retransforming that message back to its original form. In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering [2].
  • 2. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 15 Conventional Encryption is referred to as symmetric encryption or single key encryption. It can be further divided into categories of classical techniques and modern techniques. The hallmark of conventional encryption is that the cipher or key to the algorithm is shared, i.e., known by the parties involved in the secured communication. Substitution cipher is one of the basic components of classical ciphers. A substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution [3]. The units of the plaintext are retained in the same sequence as in the ciphertext, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at different times in the message— such as with homophones, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext. Hill cipher is a type of monoalphabetic polygraphic substitution cipher. In this paper, we proposed novel methods of generating self-invertible matrix which can be used in Hill cipher algorithm. The objective of this paper is to overcome the drawback of using a random key matrix in Hill cipher algorithm for encryption, where we may not be able to decrypt the encrypted message, if the matrix is not invertible. Also the computational complexity can be reduced by avoiding the process of finding inverse of the matrix at the time of decryption, as we use self-invertible key matrix for encryption. The organization of the paper is as follows. Following the introduction, the basic concept of Hill Cipher is outlined in section 2. Section 3 discusses about the modular arithmetic. In section 4, proposed methods for generating self-invertible matrices are presented. Finally, section 5 describes the concluding remarks. 2. HILL CIPHER It is developed by the mathematician Lester Hill in 1929. The core of Hill cipher is matrix manipulations. For encryption, algorithm takes m successive plaintext letters and instead of that substitutes m cipher letters. In Hill cipher, each character is assigned a numerical value like 25,...,1,0 === zba [4]. The substitution of ciphertext letters in the place of plaintext letters leads to m linear equation. For 3=m , the system can be described as follows: 26mod)( 26mod)( 26mod)( 3332321311 3232221212 3132121111 PKPKPKC PKPKPKC PKPKPKC ++= ++= ++= … (1) This case can be expressed in terms of column vectors and matrices:                     =           3 2 1 333231 232221 131211 3 2 1 P P P KKK KKK KKK C C C … (2) or simply we can write as KPC = , where C and P are column vectors of length 3, representing the plaintext and ciphertext respectively, and K is a 33× matrix, which is the encryption key. All operations are performed 26mod here. Decryption requires using the inverse of the matrix K . The inverse matrix 1− K of a matrix K is defined by the equation IKKKK -- == 11 , where I is the Identity matrix. But the inverse of the matrix does not always exist, and when it does, it satisfies the preceding equation. 1− K is applied to the ciphertext, and then the plaintext is recovered. In general term we can write as follows: For encryption: pk KPEC == )( … (3)
  • 3. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 16 For decryption: PKKCKCDP p -- k ==== 11 )( … (4) 3. MODULAR ARITHMETIC The arithmetic operation presented here are addition, subtraction, unary operation, multiplication and division [5]. Based on this, the self-invertible matrix for Hill cipher algorithm is generated. The congruence modulo operator has the following properties: 1. ( )banpba −≡ ifmod 2. ( ) ( ) pbapbpa modmodmod ≡⇒= 3. pabpba modmod ≡⇒≡ 4. pcapabpba modmodandmod ≡⇒≡≡ Let [ ]app −= ,...,1,0Z the set of residues modulo p . If modular arithmetic is performed within this set pZ , the following equations present the arithmetic operations: 1. Addition : ( ) ( ) ( )[ ] ppbpapba modmodmodmod +=+ 2. Negation : )mod(mod pappa −=− 3. Subtraction : ( ) ( ) ( )[ ] ppbpapba modmodmodmod −=− 4. Multiplication : ( ) ( ) ( )[ ] ppbpapba modmodmodmod ∗=∗ 5. Division : ( ) cpba =mod/ when ( ) pcba mod∗= The following Table exhibits the properties of modular arithmetic. Property Expression Commutative Law ( ) ( ) ( ) ( ) pxpx pxpx modmod modmod ωω ωω ∗=∗ +=+ Associative law ( )[ ] ( )[ ] pyxpyx modmod ++=++ ωω Distribution Law ( )[ ] ( ){ } ( ){ }[ ] ppypxpyx modmodmodmod ∗∗∗=+∗ ωωω Identities ( ) ( ) papaand papa modmod1 modmod0 =∗ =+ Inverses For each ,pZx ∈ ∃ y such that ( ) xypyx −==+ then0mod For each pZx ∈ ∃ y such that ( ) 1mod =∗ pyx Table 1: Properties of Modular Arithmetic 4. PROPOSED METHODS FOR GENERATING SELF-INVERTIBLE MATRIX As Hill cipher decryption requires inverse of the matrix, so while decryption one problem arises that is, inverse of the matrix does not always exist [5]. If the matrix is not invertible, then encrypted text cannot be decrypted. In order to overcome this problem, we suggest the use of self-invertible matrix generation method while encryption in the Hill Cipher. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption. A is called self-invertible matrix if 1− = AA . The analyses presented here for generation of self- invertible matrix are valid for matrix of +ve integers, that are the residues of modulo arithmetic on a prime number.
  • 4. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 17 4.1 Generation of self-invertible 22× matrix Let       = 2221 1211 aa aa A , then, )(tdeterminan ))((cofactor )(tdeterminan )(adjoint1 A A A A A T ==−       − − ∆ =∴ − 1121 12221 1 aa aa a A , where, a∆ is the )(tdeterminan A A is said to be self-invertible if 1− = AA So, aaa ∆−= /1212 & aaa ∆−= /2121 0and1 22112211 =+⇒−=−=∆∴ aaaaa … (5) Example: (For modulo 13)       = 1112 32 A 4.2 Generation of self-invertible 33× matrix Let       =           = 2221 1211 333231 232221 131211 AA AA aaa aaa aaa A where 11A is a 11× matrix = [ ]11a , 12A is a 21× matrix = [ ]1312 aa , 21A is a 12× matrix =       31 21 a a and 22A is 22× matrix =       3332 2322 aa aa If A is self-invertible then, IAAAAAAA AAAAIAAA =+=+ =+=+ 2 22122121221121 221212112112 2 11 and,0 ,0, … (6) Since 11A is 11× matrix = [ ]11a and ( ) 0221121 =+ AIaA For non- trivial solution, it is necessary that 02211 =+ AIa That is −=11a (one of the Eigen values of 22A ) 1221AA can also be written as       =            = 13311231 132112211312 31 21 1221 000 0 aaaa aaaaaa a a AA So 1221 AA is singular and 2 221221 AIAA −= … (7) Hence 22A must have an Eigen value 1± . It can be shown that [ ] 21121221 AAAATrace = . Since it can be proved that if −== 1111 aA (one of the Eigen values of 22A ), then, any non-trivial solution of the equation (7) will also satisfy 2 112112 1 aAA −= … (8) Example: (For modulo 13) Take       = 61 52 22A which has Eigen value =λ 1 and 7 −=11a 7 = 6 or −1 = 12 If 611 =a , then,       =      −=            −=−= 125 125 28 19 61 52 61 522 221221 IIAIAA
  • 5. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 18 51221 =aa . So, 521 =a and 112 =a 121321 =aa . So, 5 5 12 13 ==a and 5 1 5 31 ==a So the matrix will be           = 615 525 516 A . Other matrix can also be obtained if we take 1211 =a . 4.3 Generation of self-invertible 44× matrix Let             = 44434241 34333231 24232221 14131211 aaaa aaaa aaaa aaaa A be self-invertible matrix partitioned as       = 2221 1211 AA AA A , where       = 2221 1211 11 aa aa A ,       = 2423 1413 12 aa aa A ,       = 4241 3231 21 aa aa A ,       = 4243 3433 22 aa aa A Then, 2 112112 AIAA −= , 022121211 =+ AAAA , 021221121 =+ AAAA , and 2 221221 AIAA −= In order to obtain solution for all the four matrix equations, 2112 AA can be factorized as ( )( )11112112 AIAIAA +−= … (9) So, if ( )kAIA 1112 −= or ( )kAI 11+ ( ) k AIA 1 1121 += or ( ) k AI 1 11− , where k is a scalar constant. Then, ( ) ( ) 2211111122121211 AkAIkAIAAAAA −+−=+ or ( ) ( )112211 AIAAk −+ So, IAorAA ==+ 112211 0 … (10) Since IA =11 is a trivial solution, then, 02211 =+ AA is taken. When we solve the 3 rd and 4 th matrix equations, same solution is obtained. Example: (For Modulo 13) Take       = 48 31 22A then,       = 95 1012 11A Take 1112 AIA −= with 1=k . Then,       = 58 32 12A and       = 105 100 21A So             = 48105 31100 5895 321012 A 4.4 A general method of generating an even self-invertible matrix Let A=                 nnnn n n aaa aaa aaa ...... ............... ............... ...... ...... 21 22221 11211 be an nn × self-invertible matrix partitioned to       = 2221 1211 AA AA A , where n is even and 2221,1211 &, AAAA are matrices of order 22 nn × each.
  • 6. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 19 So, ( )( )1111 2 112112 AIAIAIAA +−=−= … (11) If 12A is one of the factors of 2 11AI − then 21A is the other. Solving the 2 nd matrix equation results 02211 =+ AA . Then form the matrix. Algorithm: 1. Select any arbitrary 22 nn × matrix 22A . 2. Obtain 2211 AA −= 3. Take ( ) ( )111112 or AIkAIkA +−= for k a scalar constant. 4. Then ( ) ( )111121 1 or 1 AI k AI k A −+= 5. Form the matrix completely. Example: (For modulo 13) Let       = 43 210 22A , then,       = 910 113 11A If k is selected as 2,       =−= 106 49 )( 1112 AIkA and       = 55 122 21A So,             = 4355 210122 106910 49113 A 4.5 A general method of generating self-invertible matrix Let A=             nnnn n n aaa aaa aaa ... ............ ... ... 21 22221 11211 be an nn × self-invertible matrix partitioned to       = 2221 1211 AA AA A 11A is a 11× matrix = [ ]11a , 12A is a )1(1 −× n matrix = [ ]naaa 11312 ... 21A is a 1)1( ×−n matrix =             1 31 21 ... na a a , 22A is a )1()1( −×− nn matrix =             nnnn n n aaa aaa aaa ... ............ ... ... 32 33332 22322 So, 2 11 2 112112 1 aAIAA −=−= … (12) and ( ) 0221112 =+ AIaA … (13) Also, −=11a (one of the Eigen values of 22A other than 1) Since 1221AA is a singular matrix having the rank 1 and 2 221221 AIAA −= … (14) So, 2 22A must have rank of )2( −n with Eigen values +1 of )2( −n multiplicity. Therefore, 22A must have Eigen values 1± . It can also be proved that the consistent solution obtained for elements 21A & 12A by solving the equation (14) term by term will also satisfy the equation (12).
  • 7. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 20 Algorithm: 1. Select 22A , a non-singular )1()1( −×− nn matrix which has )2( −n number of Eigen values of either +1 or −1 or both. 2. Determine the other Eigen value λ of 22A . 3. Set λ−=11a . 4. Obtain the consistent solution of all elements of 21A & 12A by using the equation (14). 5. Formulate the matrix. Example: (For modulo 13) Let           = 435 21012 1069 22A which has Eigen values 10,1±=λ So, [ ]311 =A , and one of the consistent solutions of [ ]491112 =A and           = 5 2 10 21A So,             = 4355 210122 106910 49113 A Another consistent solution of [ ]112112 =A and           = 3 9 6 21A So,             = 4353 210129 10696 11213 A 4.6 Another method to generate self-invertible matrix Let A be any non-singular matrix and E be its Eigen matrix. Then we know that λEAE = , where λ is diagonal matrix with the Eigen values as diagonal elements. E the Eigen matrix is non-singular. Then, 1− = EEA λ … (15) and ( ) 1111111 −−−−−−− === EEEEEEA λλλ … (16) So, 1− = AA only when 1− = λλ If                 = nλ λ λ λ ..0000 ....... ....... 0..000 0..000 2 1 then,                       =− nλ λ λ λ 1 000000 ....... ....... 0..00 1 0 0...00 1 2 1 1 Thus 1− = λλ when 1or 1 ±== i i i λ λ λ
  • 8. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy International Journal of Security, Volume 1 : Issue (1) 21 Algorithm: 1. Select any nonsingular matrix E . 2. Form a diagonal matrix λ with 1±=λ but all value of λ must not be equal. 3. Then compute AEE =−1 λ . Example: (For modulo 13)           =                 −− −− =           = − 12212 2012 1276 121 2 3 13 3 10 1 3 8 3 8 , 887 654 321 1 EE Take           = 100 0120 001 λ           =                               == − 803 6110 505 12212 2012 1276 100 0120 001 857 684 3111 1 EEA λ 5. CONCLUSION This paper suggests efficient methods for generating self-invertible matrix for Hill Cipher algorithm. These methods encompass less computational complexity as inverse of the matrix is not required while decrypting in Hill Cipher. These proposed methods for generating self- invertible matrix can also be used in other algorithms where matrix inversion is required. 6. REFERENCES 1. Blakley G.R., “Twenty years of cryptography in the open literature”, Security and Privacy 1999, Proceedings of the IEEE Symposium, 9-12 May 1999 2. Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C., “Cyptography with Information Theoretic Security”, Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002 3. A. J. Menezes, P.C. Van Oorschot, S.A. Van Stone, “Handbook of Applied Cryptography”, CRC press, 1996 4. W. Stallings, “Cryptography and Network Security”, 4 th edition, Prentice Hall, 2005 5. Bruce Schneir, “Applied Cryptography”, 2 nd edition, John Wiley & Sons, 1996